This project contains files for cyber security
☆36Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated last year
- 易观性别年龄预测算法大赛--第8名解决方案☆11Oct 19, 2018Updated 7 years ago
- ☆11Sep 28, 2022Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- This repository contains the implementation of a DDOS attack detection system using a Software-Defined Networking (SDN) network.☆17Jun 5, 2023Updated 2 years ago
- ☆10Apr 7, 2021Updated 5 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- This is my study on detection and mitigation DDoS attacks in SDN☆22Jan 16, 2024Updated 2 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- Imputation of Missing Data in Tables☆12Aug 24, 2022Updated 3 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Source code and models of ACM MobiHoc 2019 paper "Scaling Deep Learning Models for Spectrum Anomaly Detection"☆12Jul 9, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- statistical similarity of binaries (Esh)☆74Jul 1, 2016Updated 9 years ago
- ☆14Feb 4, 2022Updated 4 years ago
- ☆12Jun 26, 2020Updated 5 years ago
- Improving Adversarial Robustness via Mutual Information Estimation☆11Apr 2, 2024Updated 2 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- An open source tool chain to simulate cyber attacks in the power system☆12May 4, 2017Updated 8 years ago
- Implemented entropy-based detection using Python to allow POX controller to detect UDP Flood Attack in the simulated networks using Minin…☆22Dec 18, 2018Updated 7 years ago
- My graduation project☆10Feb 16, 2022Updated 4 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆21Mar 20, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆11Oct 5, 2020Updated 5 years ago
- A multi-community spatio-temporal graph convolutional network (MC_STGCN) for passenger demand forecasting at multi-region level☆10Sep 28, 2020Updated 5 years ago
- Matlab code of the proposed hybrid DGA method for power transformer fault diagnosis.☆13Apr 9, 2023Updated 3 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆24May 10, 2019Updated 6 years ago
- Modeling, Visualization and Voltage Stability Analysis of Nordic-32, 64 bus power systems using GridCal and NetworkX.☆10May 6, 2020Updated 5 years ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- Source Code for CRC Press book 'Natural Language Processing in the Real World' by Jyotika Singh